System and method for extracting user identifiers over encrypted communication traffic
First Claim
Patent Images
1. A method, comprising:
- monitoring, by a processor, multiple flows of communication traffic;
sending, by the processor, a sequence of layer-7 messages in accordance with a first temporal pattern to a layer-7 identifier of a user;
identifying, by the processor, among the monitored flows a flow whose activity has a second temporal pattern that matches the first temporal pattern; and
associating, by the processor, the identified flow with the user.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for extracting user identifiers over encrypted communication traffic are provided herein. An example method includes monitoring multiple flows of communication traffic. A sequence of messages is then sent to a user in accordance with a first temporal pattern. A flow whose activity has a second temporal pattern that matches the first pattern is then identified among the monitored flows. The identified flow is then associated with the user.
30 Citations
20 Claims
-
1. A method, comprising:
-
monitoring, by a processor, multiple flows of communication traffic; sending, by the processor, a sequence of layer-7 messages in accordance with a first temporal pattern to a layer-7 identifier of a user; identifying, by the processor, among the monitored flows a flow whose activity has a second temporal pattern that matches the first temporal pattern; and associating, by the processor, the identified flow with the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
an interface for communicating over a communication network; and a processor, which is configured to monitor multiple flows of communication traffic in the communication network, to send a sequence of layer-7 messages in accordance with a first temporal pattern to a layer-7 identifier of a user, to identify among the monitored flows a flow whose activity has a second temporal pattern that matches the first temporal pattern, and to associate the identified flow with the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification